ELSA-2011-0356

ELSA-2011-0356 - krb5 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2011-03-16

Description



[1.8.2-3.6]
- add revised upstream patch to fix double-free in KDC while returning
typed-data with errors (CVE-2011-0284, #681564)

[1.8.2-3.5]
- add upstream patches to fix double-free in KDC while returning typed-data
with errors (CVE-2011-0284, #681564)


Related CVEs


CVE-2011-0284

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 6 (i386) krb5-1.8.2-3.el6_0.6.src.rpm713d2c7fbd8d1b494f6e8b81a7dd4646ELSA-2016-0493
krb5-devel-1.8.2-3.el6_0.6.i686.rpm6fdd3e59f759264348fc4cbcab350a72ELSA-2016-0493
krb5-libs-1.8.2-3.el6_0.6.i686.rpm7b8f5e855c5217e41b6a80bcd664f3c3ELSA-2016-0493
krb5-pkinit-openssl-1.8.2-3.el6_0.6.i686.rpm9a92f3163222c30d10c815f67f230f46ELSA-2016-0493
krb5-server-1.8.2-3.el6_0.6.i686.rpm429f807df6e4688d40397cd992b1c59fELSA-2016-0493
krb5-server-ldap-1.8.2-3.el6_0.6.i686.rpmfc4bb9f12d2ae8a086f167c0ebc86900ELSA-2016-0493
krb5-workstation-1.8.2-3.el6_0.6.i686.rpm5361a3d2fc85ecc6fbd1610999c1b8e8ELSA-2016-0493
Oracle Linux 6 (x86_64) krb5-1.8.2-3.el6_0.6.src.rpm713d2c7fbd8d1b494f6e8b81a7dd4646ELSA-2016-0493
krb5-devel-1.8.2-3.el6_0.6.i686.rpm6fdd3e59f759264348fc4cbcab350a72ELSA-2016-0493
krb5-devel-1.8.2-3.el6_0.6.x86_64.rpmfde6f68c4c403051b4cb20a8c945a268ELSA-2016-0493
krb5-libs-1.8.2-3.el6_0.6.i686.rpm7b8f5e855c5217e41b6a80bcd664f3c3ELSA-2016-0493
krb5-libs-1.8.2-3.el6_0.6.x86_64.rpmfd0c0e6404ea7b19050f07112006d460ELSA-2016-0493
krb5-pkinit-openssl-1.8.2-3.el6_0.6.x86_64.rpm41a0166b1fcd4649046cf2a97dd12a99ELSA-2016-0493
krb5-server-1.8.2-3.el6_0.6.x86_64.rpme58e166b3f562e96cc486770e44c090fELSA-2016-0493
krb5-server-ldap-1.8.2-3.el6_0.6.i686.rpmfc4bb9f12d2ae8a086f167c0ebc86900ELSA-2016-0493
krb5-server-ldap-1.8.2-3.el6_0.6.x86_64.rpm20368dd4d495d3638288ab1838b3ac4fELSA-2016-0493
krb5-workstation-1.8.2-3.el6_0.6.x86_64.rpm3a9351db63c0e8592f33c387b4e6ca21ELSA-2016-0493



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete